Results 61 to 70 of about 1,094,705 (275)

Design and analysis of group key exchange protocols [PDF]

open access: yes, 2010
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security ...
Gorantla, Malakondayya Choudary
core   +1 more source

A Secure Traitor Tracing Scheme against Key Exposure

open access: yes, 2005
Copyright protection is a major issue in distributing digital content. On the other hand, improvements to usability are sought by content users. In this paper, we propose a secure {\it traitor tracing scheme against key exposure (TTaKE)} which contains ...
Hanaoka, Goichiro   +2 more
core   +2 more sources

Analysis and improvement of an ID-based authenticated key agreement protocol

open access: yesTongxin xuebao, 2008
The security of a recently proposed ID-based authenticated key agreement protocol was analyzed. Although it is provably secure in the standard model, a malicious PKG (private key generator) can still obtain all of the agreed ses-sion keys, that is, it ...
WANG Xiao-fen1   +2 more
doaj   +2 more sources

Secure and Reliable IPTV Multimedia Transmission Using Forward Error Correction

open access: yesInternational Journal of Digital Multimedia Broadcasting, 2012
With the wide deployment of Internet Protocol (IP) infrastructure and rapid development of digital technologies, Internet Protocol Television (IPTV) has emerged as one of the major multimedia access techniques.
Chi-Huang Shih   +2 more
doaj   +1 more source

NKCC1: A key regulator of glioblastoma progression

open access: yesMolecular Oncology, EarlyView.
Glioblastoma (GBM) progression is driven by disrupted chloride cotransporter homeostasis. NKCC1 is highly expressed in stem‐like, astrocytic, and progenitor cells, correlating with earlier recurrence, while overall survival remains unaffected. NKCC1 serves as a prognostic marker and potential therapeutic target, linking chloride transporter imbalance ...
Anja Thomsen   +5 more
wiley   +1 more source

Web development evolution: the business perspective on security [PDF]

open access: yes, 2006
Protection of data, information, and knowledge is a hot topic in today’s business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and ...
Glisson, L.M.   +2 more
core  

Interaction of HS1BP3 with cortactin modulates TKS5 localisation, cell secretion and cancer malignancy

open access: yesMolecular Oncology, EarlyView.
Here, we demonstrate that HS1BP3 interacts with Cortactin through a proline‐rich region (PRR3.1) and show that this interaction, and HS1BP3 itself, promote cancer cell proliferation and invasion. Inhibition of this interaction leads to build‐up of TKS5 in multivesicular endosomes and altered secretion of CD63 and CD9, providing an explanation for the ...
Arja Arnesen Løchen   +9 more
wiley   +1 more source

Verifiably Secure Devices [PDF]

open access: yes, 2007
We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices1. Provide a perfect solution to the problem of achieving correlated equilibrium,
Izmalkov, Sergei   +2 more
core  

Secure Multi-Party Computation Based Privacy Preserving Extreme Learning Machine Algorithm Over Vertically Distributed Data

open access: yes, 2015
Especially in the Big Data era, the usage of different classification methods is increasing day by day. The success of these classification methods depends on the effectiveness of learning methods.
Çatak, Ferhat Özgür
core   +1 more source

Clinical performance of the urine‐based TERT promoter AbsoluteQ Digital PCR for non‐invasive detection of bladder cancer

open access: yesMolecular Oncology, EarlyView.
A urine‐based digital PCR assay targeting two hotspot TERT promoter variants detected bladder cancer with high sensitivity and no false positives in this case–control cohort. The streamlined AbsoluteQ workflow outperformed Sanger sequencing and supports non‐invasive molecular testing for bladder cancer detection.
Anna Nykel   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy